CryptographySee also what's at Wikipedia, your library, or elsewhere.
Broader terms:Related terms:Narrower terms:Used for:- Cryptanalysis
- Cryptology
- Secret writing
- Steganography
|
Filed under: Cryptography- Military Cryptanalysis (4 volumes originally issued 1938-1941; declassified version published 2005), by William F. Friedman (PDF files at nsa.gov)
- Mathematics and Computation: A Theory Revolutionizing Technology and Science (prepublication version, c2019), by Avi Wigderson (PDF with commentary at ias.edu)
- Cryptography and Data Security (Reading, MA et al.: Addison-Wesley, c1982), by Dorothy Elizabeth Robling Denning (PDF at npos.edu)
- Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design (1998), by Electronic Frontier Foundation (HTML at cryptome.org and other sites)
- Cryptography's Role in Securing the Information Society (prepublication copy), ed. by Kenneth Dam and Herbert Lin (HTML and page images at NAP)
- Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
- The Mathematical and Philosophical Works Of the Right Reverend John Wilkins (London: Printed for J. Nicholson, 1708), by John Wilkins (page images at Google)
Filed under: Cryptography -- BibliographyFiled under: Cryptography -- Handbooks, manuals, etc.
Filed under: Cryptography -- Military aspects -- Handbooks, manuals, etc.Filed under: Cryptography -- Textbooks
Filed under: Cryptography -- United States -- Automation -- History- It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis, 1930s-1960s (originally published by NSA Center for Cryptologic History, 2002; redacted declassified version released 2013), by Colin B. Burke
Filed under: Cryptography -- United States -- History
Filed under: Cryptography -- United States -- History -- 20th centuryFiled under: Cryptography -- United States -- History -- Sources
Filed under: Indian code talkers- Code Talkers: Hearing Before the Committee on Indian Affairs, United States Senate, One Hundred Eighth Congress, Second Session, on Contributions of Native American Code Talkers in American Military History (Washington: GPO, 2004), by United States Senate Committee on Indian Affairs
Filed under: Cryptography in literatureFiled under: Korean War, 1950-1953 -- CryptographyFiled under: Poe, Edgar Allan, 1809-1849 -- Knowledge -- Cryptography
Filed under: Vietnam War, 1961-1975 -- Cryptography -- HistoryFiled under: World War, 1914-1918 -- Cryptography- Code Talkers: Hearing Before the Committee on Indian Affairs, United States Senate, One Hundred Eighth Congress, Second Session, on Contributions of Native American Code Talkers in American Military History (Washington: GPO, 2004), by United States Senate Committee on Indian Affairs
Filed under: World War, 1939-1945 -- Cryptography- Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust, 1939-1945 (second edition; Fort George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2005), by Robert J. Hanyok (PDF at nsa.gov)
- Code Talkers: Hearing Before the Committee on Indian Affairs, United States Senate, One Hundred Eighth Congress, Second Session, on Contributions of Native American Code Talkers in American Military History (Washington: GPO, 2004), by United States Senate Committee on Indian Affairs
- The Cryptographic Imagination: Secret Writing from Edgar Poe to the Internet (originally published 1997; open access edition Baltimore: Johns Hopkins University Press, 2019), by Shawn Rosenheim (HTML and PDF files with commentary at Project MUSE)
Items below (if any) are from related and broader terms.
Filed under: Ciphers- Military Cryptanalysis (4 volumes originally issued 1938-1941; declassified version published 2005), by William F. Friedman (PDF files at nsa.gov)
- The Voynich Manuscript: An Elegant Enigma (Fort George G. Meade, MD: National Security Agency/Central Security Service, 1978), by M. E. D'Imperio (page images at HathiTrust)
- Fundamental Principles of the Baconian Ciphers, and Application to Books of the Sixteenth and Seventeenth Centuries (typescript version; c1916), by George Fabyan
- Fundamental Principles of the Baconian Ciphers and Application to Books of the Sixteenth and Seventeenth Centuries (ca. 50-page printed version; c1916), by George Fabyan
- Lessons in the Greatest Work of Sir Francis Bacon of Verulam, Viscount St Alban (expanded version of his "Fundamental Principles of the Baconian Ciphers..."; c1916), by George Fabyan
- Cracking Codes with Python, by Al Sweigart (illustrated HTML with commentary at inventwithpython.com)
Filed under: Ciphers -- Early works to 1800- Voynich manuscript
Filed under: Ciphers -- Handbooks, manuals, etc.Filed under: Cipher and telegraph codes
Filed under: Morse code -- FictionFiled under: Ciphers in literatureFiled under: Telegraph
Filed under: Telegraph -- Anecdotes
Filed under: Telegraph -- Arctic regions
Filed under: Telegraph -- Brazil
Filed under: Telegraph -- History
Filed under: Telegraph -- Humor
Filed under: Telegraph -- Juvenile fiction
Filed under: Telegraph -- PeriodicalsMore items available under broader and related terms at left. |